CVE-2019-12499

NameCVE-2019-12499
DescriptionFirejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the --shutdown control command). This is similar to CVE-2019-5736.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs929733

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firejail (PTS)buster, buster (security)0.9.58.2-2+deb10u3fixed
bullseye (security), bullseye0.9.64.4-2+deb11u1fixed
sid, trixie, bookworm0.9.72-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firejailsourcestretch(not affected)
firejailsource(unstable)0.9.58.2-2929733

Notes

[stretch] - firejail <not-affected> (Vulnerable code introduced later)
https://github.com/netblue30/firejail/issues/2401
https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134

Search for package or bug name: Reporting problems